Backup and Business Continuity; Although these two terms are related they represent entirely different mindsets when it comes to total data protection. How? Well, let me explain.
Phishing attacks are a common security problem that companies face almost daily. Whether it's getting access to passwords, credit cards, or other sensitive information, hackers are using email, social media, phone calls, and any form of communication they can to steal valuable data.
Recently, Webroot released their 2017 list of nastiest ransomware and we agree that this list is worthy of being called downright nasty. Check out what ransomware made the list of top ten!
If you work in healthcare, chances are you have heard of a medical practice experiencing ransomware but what you may not have heard about was how the medical practice dealt with the ransomware attack.
Like a security guard, firewalls control what goes in, and what comes out.
Many smaller healthcare practices struggle to understand how HIPAA requirements translate into specifics for their computer and network environment. HIPAA requirement §164.312(c)(1) for example. This guide will help!
It seems almost every day that you hear of a new data breach that happened to a well-known company like Uber or Equifax--Imagine how many more security breaches that are likely occurring that you don't hear about.
Medicus IT Named to ChannelE2E Top 100 Vertical Market MSPs: 2018 Edition